Introduction

A multidisciplinary discipline of quantum mechanics and informatics, quantum information and computing has grown rapidly and produced amazing advancements in a number of fields, including quantum computers, quantum communication, and quantum cryptography1. A subfield of quantum information called "quantum image processing" is focused on developing quantum protocols and methods for storing, extending, and recapturing visual data. Despite being in its upbringing, the discipline has so far made substantial advances to the processing of images, such as quantum image steganography and disambiguation2, quantum image encryption3,4,5, and quantum image watermarking6,7.

Image encryption is commonly used to conceal image data and carry out initial or post processing for safe storage and transportation. Its major purpose is to disrupt an organized real life image, which may drastically enhance image preservation. To address the dual challenges of encryption efficiency and security, researchers have developed diverse cryptographic approaches leveraging both classical and emerging paradigms. Chaotic systems remain a cornerstone of this field due to their inherent unpredictability8,9, with recent advancements introducing memristor-based chaotic neurons10,11. Complementary techniques such as DNA sequence operations12,13 and compressed sensing14 offer additional layers of security, while neural network-based methods11,15 demonstrate adaptive encryption capabilities. The field has also seen growing integration of quantum principles16,17 and hybrid approaches.

Cryptography, on the one hand, is a continuous process. Since demonstrating their disruptive predominance, quantum computers made an enormous mark on present time cryptosystems. One method for reducing the ultimatum caused by quantum computers is that they use Shannon’s one-time password (OTP)18 encryption, which is scientifically unreservedly strong, indicating that there is no way to rupture it. An OTP’s encryption and decryption are quite simple. A set of keys is shared between the encryption and decryption processes prior to encryption. Because each bit of the key can only be used once and the key length must match the message length, the encryption challenge becomes one of giving the sender and the recipient the shared secret in order to guarantee the OTP’s unconditional security. Although, in person key exchange is a powerful technique, but that frequently falls short of user requirements, such as temporary and remote encryption operations. An isolated, immediate, and potentially unbreakable secure mechanism for sharing key is provided by quantum key distribution (QKD). Bennett and Brassard devised the first QKD protocol in 1984, which became known as the BB84 protocol19. Many researchers proceeded further to verify its theoretical safety20,21,22,23.

Yin et al.24 suggested an effective quantum digital signature method using quantum keys that are asymmetric acquired by a general hash and secret sharing. Furthermore, the author develops the first quantum security network that consolidates digital signatures, safe transmission and secret sharing. Through tests, author illustrates the advantages of this signature efficiency.

Chaos is a great encryption technique for uncertainty and dissemination because of its accessibility and productivity, high susceptibility to starting conditions, auto correlating rapid decrease, unpredictability and disorderly like properties., creating a revolutionary encryption technique. According to the theory, hyper-chaos is more likely to occur in chaotic high-dimensional systems.

Rossler25 established the concept of hyper-chaos and put forth the hyperchaotic Rossler system. Because a hyperchaotic system26 has more Lyapunov exponents and its dynamic behavior is harder to anticipate, it is more beneficial in safe communication as opposed to an all around chaotic system.

The field of chaos-based image encryption has evolved considerably in recent years, with numerous innovative algorithms emerging that exploit the unique advantages of chaotic systems for secure data protection27,28,29,30,31,32.

Image encryption makes extensive use of the efficient scrambling effect of the Fibonacci transformation33. It has a fatal fault, though, in that it is readily cracked after many attempts. The preparation techniques for various quantum image representations may vary. Numerous quantum image representation schemes had been suggested by researchers34,35. In 2011, Le et al.36 introduced the Flexible Representation of Quantum Images (FRQI) model. Zhang et al.37 presented the A Novel Enhanced Quantum Representation (NEQR) model in 2013. Both methods combined color and location data into quantum superposed phases to represent visual data by utilizing the characteristics of quantum entanglement. In 2015, Jiang et al.38 introduced Generalized Quantum Image Representation (GQIR) model, which overcame the limitation of previous models that could only represent images of fixed sizes and color depths, enabling the representation of images with any depth of color and size.

She-Xiang Jiang et al.39 introduced a novel double quantum image representation (DNEQR) model capable of encoding two digital images simultaneously within a single quantum superposition state. In addition, they developed a new two-dimensional hyperchaotic system derived from sine and logistic maps, which demonstrates improved chaotic properties and a broader parameter range compared to conventional models.

El Latif AAA et al.40 made major improvements to key space and algorithm enactment the same year. Even though several encryption algorithms, such as Fibonacci, Arnold and Hilbert scrambling41, are quite simple,42,43 used them on quantum circuits.

Jilong Cui et al.44 proposed a quantum watermarking scheme that utilizes a novel enhanced quantum representation (NEQR) of images. Their method incorporates a space geometric transformation alongside Fibonacci scrambling to enhance the robustness and security of watermark embedding in the quantum domain.

Recently, Yan et al.45 proposed quantum color image compression and encryption algorithm based on Fibonacci transform.

Using several effective encryption columns, Guohao Cui et al.46 have proven adept at ciphering intricate quantum data. The calculation becomes more challenging due to the discrete Fourier transform and quantum walk. Despite that, these systems have drawbacks, including processing constraints and lack of long-term cryptanalysis due to their novelty. Being relatively new, quantum walk-based ciphers may have unexamined vulnerabilities (e.g., attacks exploiting symmetry in walks, or quantum backtracking).

To overcome the limitations of existing encryption methods such as insufficient robustness against quantum attacks and suboptimal efficiency for high-dimensional data, we propose a Quantum Chaos-Based Image Encryption Scheme (QCIES). QCIES utilizes a chaotic system for image encryption18,26,45. The incorporation of chaos-based encryption offers several advantages, such as improved security, the capacity to decrease pixel correlation, and non-deterministic image production, thereby increasing resilience to various types of attacks. This marks a significant advancement developing quantum image encryption methods that are more reliable and secure.

For the first time, image encryption is achieved using a key set derived from the 4D-HLS47, which is applied to both the intertwined color and correlate information. By merging quantum Fibonacci transform along an additional key for encryption generated by 4D-HLS, an operator for encryption is attained. The final encryption is then completed by applying this operator on the image that was encrypted in initial phase. Furthermore, image preparing steps such as Fibonacci perturbing and encryption of color values can be implemented using quantum circuits, indicating this method holds significant potential for practical implementation on quantum devices.

Cryptanalysis is essential for evaluating the robustness and practicality of image encryption schemes, as evidenced by recent studies exposing vulnerabilities in even advanced cryptographic systems. For instance, quantum chaotic maps combined with DNA coding were cryptanalyzed through chosen-plaintext attacks, revealing weak diffusion properties48. In medical image encryption, high-speed scrambling and pixel-adaptive diffusion methods were found susceptible to statistical attacks due to inadequate entropy preservation49. Even structured approaches like Feistel networks with dynamic DNA encoding have been compromised when chaotic systems lack ergodicity50, while 2D logistic-adjusted-sine maps were shown to degrade security under chosen-ciphertext attacks51. These findings underscore the necessity of rigorous cryptanalysis not only to identify weaknesses but also to guide the design of resilient systems. In this work, we validate the proposed QCES against these attack vectors, ensuring its resistance to known statistical, differential, and chosen-text attacks through formal security analysis, chaos-based key sensitivity tests, and comparative benchmarking with prior cryptanalyzed schemes.

The key contributions of this paper are summarized as follows:

  • We propose the Quantum Chaos-Based Image Encryption Scheme (QCIES), integrating a 4D hyperchaotic Lorenz system (4D-HLS) with quantum Fibonacci transform (QFT). This combination enhances both security and computational efficiency, addressing limitations in existing quantum-chaotic encryption methods.

  • Unlike conventional chaotic systems, our 4D-HLS generates highly unpredictable keystreams with improved Lyapunov exponents and entropy, significantly expanding the key space and resisting brute-force attacks.

  • We introduce a two-phase encryption process that combines:

A hyperchaos-driven pixel permutation technique that completely disrupts spatial correlations in the image, eliminating structural patterns vulnerable to correlation analysis.

The Quantum Fibonacci Transform (QFT) applies nonlinear, quantum-inspired operations to alter pixel values at the bit-level, ensuring robust confusion properties.

  • We prove that QCIES reduces computational complexity in quantum image encryption compared to classical methods

This article is structured as follows. 4D-HLS, quantum adder, quantum Fibonacci scrambling, and the improved quantum color image representation technique are all introduced in section “Related work”. The encryption and decryption process for images is described in section “Workflow of encryption and decryption process”. The suggested GQIR color image encryption scheme, which is based on the multidimensional chaotic system and an experimental analysis is presented in section “Simulation experiment and analysis”. A succinct conclusion is presented in section ”Conclusion”.

Related work

Herein, we first present the 4D hyperchaotic Lorenz system (4D-HLS) that serves as the chaotic foundation of QCIES. We then introduce the generalized quantum image representation (GQIR) framework for encoding color images, followed by the quantum Fibonacci transform (QFT) and its quantum adder implementation for secure pixel diffusion.

4D-HLS

Chaotic phenomena are deterministic but display stochastic-like behavior in nonlinear dynamical structures, which are very sensitive to initial circumstances, acyclic, and non-convergent. 4D-HLS, which adds a fourth dimension while maintaining the chaotic dynamics, is based on the 3D Lorenz system47. The system is specified by the following Eq. (1)

$$\left\{\begin{array}{l}\frac{dx}{dt}=\alpha \left(-x+y\right)+w,\\ \frac{dx}{dt}=\alpha \left(-x+y\right)+w,\\ \frac{dz}{dt}=xy-\beta z, \\ \frac{dw}{dt}=rw-yz, \end{array}\right.$$
(1)

At least two positive Lyapunov exponents and at least one four-dimensional phase space are requirements for hyperchaotic systems52,53. Wang’s method54 states that when starting parameters are set to \(\alpha = 10, \beta = 8/3, \gamma = 28, \text{and }-1.52 \le r < -0.06\) (the control parameters are defined in Eq. 1), the system behaves in a hyperchaotic manner. Additionally, there is complete flexibility in the beginning values for \(x, y, z,\, \text{and}\, w\). Figure 1 illustrates the Runge–Kutta method and Python software used to discretize 4D-HLS. The control parameter is \(r = -1\). The system’s Lyapunov exponents are \(\lambda_1 = 0.3381, \lambda_2 = 0.1586, \lambda_3 = 0,\text{ and }\lambda_4 = -15.1752\), proving hyperchaos.

Fig. 1
Fig. 1
Full size image

Lorenz attractor projection with the parameter set to \(r=-1 .\) (a) \(x-y\text{ plane}\). (b) \(x-z\text{ plane}\). (c)\(x-w\text{ plane}\). (d) \(y-z\text{ plane}\). (e) \(y-w\text{ plane}\). (f) \(z-w\text{ plane}\).

Quantum color image representation of GQIR

Quantum image processing leverages fundamental quantum principles such as quantum parallelism and quantum entanglement to optimize image storage, improve processing speed, enhance the security of information transmission and the efficiency of computing resources. As an improvement over the Novel Enhanced Quantum Representation (NEQR) model, we use Jiang Nan’s Generalized Quantum Image Representation (GQIR) technique in this work, which enables more efficient quantum image representation by utilizing entangled quantum sequences. GQIR allows for the scaling of image size from \({2}^{n}\times {2}^{n}\) to arbitrary dimensions of \(H\times W,\) where \(H\) represents the image’s height and \(W\) its width. For an image of size \(H\times W\), each color channel has a value of \(\left[0, {2}^{d-1}\right],\) where \(d\) is the RGB’s channel color depth, the quantum state representation of GQIR image is defined accordingly:

$$|\psi \rangle =\frac{1}{{\sqrt{2}}^{h+w}}\sum_{Y=0}^{H-1}\sum_{X=0}^{W-1}{\otimes }_{j=0}^{d-1}|{C}_{YX}^{j}\rangle |YX\rangle .$$
(2)

where \(|YX\rangle\) demonstrates coordinate information and \(|{C}_{YX}^{j}\rangle\) demonstrates color information. The bits of \(|{C}_{YX}^{j}\rangle\) are equally divided into three parts: \(|R\rangle\) \(|G\rangle\) \(|B\rangle\), representing the R, G, and B channels of the quantum color image, respectively. \(|YX\rangle\) and \(|{C}_{YX}^{j}\rangle\) are shown in Eq. (3).

$$\begin{aligned}|YX\rangle &=|Y\rangle |X\rangle =|{y}_{0}{y}_{1}{y}_{2}\dots {y}_{h-1}\rangle |{x}_{0}{x}_{1}{x}_{2}\dots {x}_{w-1}\rangle , \\ |{C}_{YX}^{j}\rangle &=|{R}_{YX}^{0}\dots {R}_{YX}^{d-1}\rangle |{G}_{YX}^{0}\dots {G}_{YX}^{d-1}\rangle |{B}_{YX}^{0}\dots {B}_{YX}^{d-1}\rangle.\end{aligned}$$
(3)

where \(j=0,1,\dots , d-1 \& {y}_{j}, {x}_{j} \in \left\{0, 1\right\}.\) Equation (4) can be used to formulate the values of \(h\) and \(w\).

$$\begin{aligned}h&=\left\{\begin{array}{ll}\left[{\text{log}}_{2}H\right],& H>1\\ 1& H=1\end{array}\right.\\ w&=\left\{\begin{array}{ll}\left[{\text{log}}_{2}W\right],& W>1\\ 1 &W=1\end{array}\right.\end{aligned}$$
(4)

Quantum representation can drastically cut down on the amount of storage space needed for color images as compared to traditional techniques. For a color image of size \({2}^{n}\times {2}^{n}\), the classical image representation requires \(8\times {2}^{n}\times {2}^{n}+{n}^{2}\) bits. In contrast, quantum image representation requires \(2n+3d\) quantum bits where \(d\) is the quantity of bits required for each channel representation, so image’s color depth is represented by \(d+d+d\) quantum bits, and coordinate data \(Y\) and \(X\) of image stored with \(2n\) quantum bits consecutively. Then, \({\text{log}}_{2}H+{\text{log}}_{2}W+d\) qubits are finally required for an image in quantum state of a GQIR’s color model. GQIR’s color imitation and its associated quantum representation with the range size \(\left[0, {2}^{8-1}\right]\), \(n=1\) and \(q=8\) are used to illustrate a \(2\times 2\) image in Fig. 2.

Fig. 2
Fig. 2
Full size image

A quantum representation of \(2\times 2\) size of GQIR color image.

With quantum mechanical measurement theory36, using measurement operator \(\widehat{L}\) we may find the image in the quantum state \(|\psi \rangle\). \(\widehat{L}\) represents the position of the measurement operator in a quantum state as shown in Eq. \((5)\).

$$\widehat{L}=\sum_{Y=0}^{H-1}\sum_{X=0}^{W-1}\left|YX\right\rangle \left\langle YX\right|{I}^{\otimes q}.$$
(5)

where \(q\) is the identity matrix used for color data on each pixel and \({I}^{\otimes q}\) is the tensor product of identity matrix. The color information measurement operator \(\widehat{C}\) is shown is Eq. (6).

$$\widehat{C}=\sum_{{c}^{\prime}=0}^{{2}^{q}-1}C\left|{c}^{\prime}\right\rangle \left\langle{c}^{\prime}\right|.$$
(6)

The eigenvalues of \(C\) are denoted by \({c}^{\prime}\). Accurate observation of the image’s information is possible once the operator has been applied to the quantum image. The GQIR color image’s quantum circuit is shown in Fig. 3.

Fig. 3
Fig. 3
Full size image

Quantum circuit of \(2\times 2\) size of GQIR color image.

Fibonacci transformation (FT)

The Fibonacci Transform (FT) scrambles image pixels depending on Fibonacci sequence. The image uses Fibonacci matrix to disorder its own pixel coordinates’ position ordering in order to finish the shuffling process. The image that will be encrypted is labeled as \(I(x,y)\), and its dimensions are \({2}^{n}\times {2}^{n}\). Equation (7) provides a definition of the FT.

$$\left(\begin{array}{c}{x}^{\prime}\\ {y}^{\prime}\end{array}\right)=\left(\begin{array}{cc}1& a\\ b& 0\end{array}\right)\left(\begin{array}{c}x\\ y\end{array}\right)\left(mod\, {2}^{n}\right),\quad x,y=0,1,\ldots , {2}^{n}.$$
(7)

The generalized form of FT is shown in Eq. (8).

$$\left\{\begin{array}{l}{x}^{\prime}=\left(x+ay\right)\,\, mod\, \,{2}^{n},\\ {y}^{\prime}=\left(bx\right)\,mod\, {2}^{n},\end{array}\right.$$
(8)

The output \(({x}^{\prime}, {y}^{\prime})\) represents the scrambled coordinates of \(x\) and \(y\). The inverse FT is generated by reversing the FT. The inverse of classical FT is shown in Eq. (9).

$$\left(\begin{array}{c}x\\ y\end{array}\right)=\left(\begin{array}{cc}0& a\\ b& -1\end{array}\right)\left(\begin{array}{c}x^{\prime}\\ y^{\prime}\end{array}\right)\,mod\, {2}^{n},\quad x,y=0,1,\ldots , {2}^{n}.$$
(9)

The inverse of generalized FT is shown in Eq. (10).

$$\left\{\begin{array}{l}x=\left(a{y}^{\prime}\right) mod\, {2}^{n},\\ y=\left(b{x}^{\prime}-{y}^{\prime}\right) mod\, {2}^{n},\end{array}\right.$$
(10)

Quantum adder

Quantum circuits’ reversibility17 enables the implementation of complex computations. The quantum ADDER, that combines the data kept in 2 quantum registers, is one of them. Equation (11) illustrates how the quantum ADDER functions if the 2 quantum registers are \(\left|x\rangle \right.\) and \(\left|y\rangle \right.\).

$$\left|\text{x},\text{y}\rangle \to \left|\text{x},\text{ x}+\text{y}\rangle .\right.\right.$$
(11)

The calculated sum of two additive values \(x\) and \(y\) are reserved in the original \(y\) location. When adding negative values, it’s appropriate to use same ADDER because binary negative figures are represented in an additive manner. The image becomes non-rectangular and goes beyond the scope after passing the adder. With a particular implementation technique, the adder network depicted in Fig. 4 should be used to create the quantum modular N17 adder. Equation (12) is used to determine the quantum ADDER with modulus \(N\).

Fig. 4
Fig. 4
Full size image

(a) Quantum ADDER. (b) Quantum ADDER-MOD.

$$\left|\text{x},\text{y}\rangle \to \left|\text{x}, \left(\text{x}+\text{y}\right)\, mod\, N\rangle .\right.\right.$$
(12)

Quantum fibonacci transform (QFT)

We require a quantum adder-mod \({2}^{n}\) module in order to transform FT to the Quantum Fibonacci transform (QFT) and work with quantum images. QFT and its inverse are shown in Eqs. (13) and (14).

$$\left\{\begin{array}{l}\left|{x^{\prime}}\rangle =\left|\left(\text{x}+\text{ay}\right)\, mod\, {2}^{n}\rangle \right.,\right.\\ \left|{x^{\prime}}\rangle =\left|\left(\text{x}+\text{ay}\right)\, mod\, {2}^{n}\rangle \right.\right.,\end{array}\right.$$
(13)
$$\left\{\begin{array}{l}\left|\text{x}\rangle =\left|\left(\text{ay}^{\prime}\right)\, mod\, {2}^{n}\rangle \right.\right., \\ \left|\text{y}\rangle =\left|\left({\text{bx}}^{{{\prime}}}-{y^{\prime}}\right)\, mod\, {2}^{n}\rangle \right.\right.,\end{array}\right.$$
(14)

A quantum adder is being utilized in methodology of QFT of image position data. The FT used for pixel shuffling of image. Table 1 provides definitions for the classical, generalized and quantum form of FT, and the inverse forms that correspond to it. The components \(x,y,{x}^{\prime},y^{\prime}\in \text{0,1},\dots , {2}^{n}\), \(\left(x,y\right)\) represents the pixel position of the original image, while \({x}^{\prime},y^{\prime}\) corresponds to the scrambled one, \(a\) and b are two positive integers, and \({2}^{n}\times {2}^{n}\) is the size of the original image.

Table 1 Classical Generalized and QFT.

Workflow of encryption and decryption process

This work presents QCIES, an advanced multi-image encryption algorithm that synergistically combines the robust chaotic behavior of 4D-HLS with quantum-inspired Fibonacci transformations to achieve superior security and performance characteristics. To protect images, the recommended QCIES consists of several key stages. A plain image is first converted to a quantum image. 4D-HLS is then used to create the keys. In order to do diffusion, the received information from the quantum image and the color operator created using two of the generating keys are subjected to an XOR operation. An intermediate cipher image is created concurrently. Secret keys are also used in the quantum Fibonacci transform to increase security. An encrypted image with a robust resistance against unauthorized access is produced by the exacting process. Figure 5 illustrates the workflow of our recommended QCIES. The decryption procedure of QCIES is shown in Fig. 6, which outlines the process to reverse the encryption to recover the original satellite image.

Fig. 5
Fig. 5
Full size image

Encryption process of quantum color image.

Fig. 6
Fig. 6
Full size image

Decryption process of quantum color image.

Encryption procedure

This section explains the encryption process of 4D-HLS based QCIES. The proposed encryption algorithm consists of four main stages: quantum image conversion, extracting parameters, diffusion, and scrambling. The following is a list of the measures that were taken in this investigation.

1. A plain RGB image of dimensions \(H\times W\) is selected, where \(H\) and \(W\) denotes height and width of image respectively.

2. Encryption Stage 1: Convert to Quantum State

The first phase in retaining the global dimensional properties of the original image is to turn it into a quantum image using the GQIR method. The quantum representation of color image using GQIR could be defined accordingly:

$$\left|\psi \rangle \right.=\frac{1}{{\sqrt{2}}^{h+w}}\sum_{Y=0}^{H-1}\sum_{X=0}^{W-1}{\otimes }_{j=0}^{d-1}\left|{R}_{YX}^{0}\dots {R}_{YX}^{d-1}\right\rangle \left|{G}_{YX}^{0}\dots {G}_{YX}^{d-1}\right\rangle \left|{B}_{YX}^{0}\dots {B}_{YX}^{d-1}\right\rangle \left|YX\right\rangle.$$
(15)

where \(\left|YX\right\rangle\) demonstrates coordinate information and \(\left|{C}_{YX}^{j}\right\rangle\) demonstrates color information. The bits of \(\left|{C}_{YX}^{j}\right\rangle\) are equally divided into three parts: \(\left|R\right\rangle\) \(\left|G \right\rangle\) \(\left|B \right\rangle\), representing the R, G, and B channels of the quantum color image, respectively. \(\left|YX \right\rangle\) and \(\left|{C}_{YX}^{j} \right\rangle\) are shown in Eq. (16).

$$\begin{aligned}\left|YX \right\rangle&=\left|Y \right\rangle\left|X \right\rangle=\left|{y}_{0}{y}_{1}{y}_{2}\dots {y}_{h-1} \right\rangle\left|{x}_{0}{x}_{1}{x}_{2}\dots {x}_{w-1} \right\rangle , {y}_{j}, {x}_{j} \in \left\{0, 1\right\}\\ \left|{C}_{YX}^{j} \right\rangle&=\left|{R}_{YX}^{0}\dots {R}_{YX}^{d-1} \right\rangle\left|{G}_{YX}^{0}\dots {G}_{YX}^{d-1} \right\rangle\left|{B}_{YX}^{0}\dots {B}_{YX}^{d-1} \right\rangle.\end{aligned}$$
(16)

where \(j=\text{0,1},\dots , d-1.\)

3. Encryption Stage 2: Reading Parameter \(\widehat{{\varvec{L}}}\)

Using measurement operator \(\widehat{L}\), it is possible to retrieve the corresponding information about the image in quantum state using Eq. (17).

$$\widehat{L}=\sum_{Y=0}^{H-1}\sum_{X=0}^{W-1}\left|YX \right\rangle\left\langle YX\right|{I}^{\otimes q}.$$
(17)

where \(q\) is the identity matrix utilized for each pixel’s color information and \({I}^{\otimes q}\) is tensor product of identity matrix. The color information measurement operator \(\widehat{C}\) can be obtained using Eq. (18).

$$\widehat{C}=\sum_{{c}^{\prime}=0}^{{2}^{q}-1}C\left|{c}^{\prime} \right\rangle \left\langle{c}^{\prime}\right|.$$
(18)

4. Encryption stage 3: diffusion phase

Using two keys \({K}_{2}\) and \({K}_{3}\), the random color encryption operator generated to performs a modular operation \({P}_{n}\left(Y,X\right)\). An XOR operation is then applied between \({P}_{n}\left(Y,X\right)\) and the correspondent information of quantum image to conceal its information. Finally, the quantum state containing the RGB data is regularized to produce the first encrypted image \(|{{\varvec{\psi}}}_{1}\rangle\) as described in Eq. (19).

$${P}_{n}\left(Y,X\right)=floor \left\{\frac{{K}_{{n}_{2}}+1}{{K}_{{n}_{2}}+{K}_{{n}_{1}}+2}\times 10^{14}\right\}mod\, 256.$$
$$|{\psi }_{1}\rangle =\frac{1}{{\sqrt{2}}^{h+w}}\sum_{Y=0}^{H-1}\sum_{X=0}^{W-1}{\otimes }_{j=0}^{d-1}|{R^{\prime}}_{YX}^{i}\rangle \,|{G^{\prime}}_{YX}^{i}\rangle |{B^{\prime}}_{YX}^{i}\rangle |YX\rangle ,$$
(19)
$$|{R^{\prime}}_{YX}^{i}{G^{\prime}}_{YX}^{i}{B^{\prime}}_{YX}^{i}\rangle =\left|{R^{\prime}}_{YX}^{0}\dots {R^{\prime}}_{YX}^{255}\right\rangle \left|{G^{\prime}}_{YX}^{0}\dots {G^{\prime}}_{YX}^{255}\right\rangle \left|{B^{\prime}}_{YX}^{0}\dots {B^{\prime}}_{YX}^{255}\right.\rangle ,\in \left\{\text{0,1}\right\}$$
$$\left|{R^{\prime}}_{YX}^{n-1}{G^{\prime}}_{YX}^{n-1}{B^{\prime}}_{YX}^{n-1}\right\rangle =\left|\frac{{r^{\prime}}_{YX}^{n-1}{g^{\prime}}_{YX}^{n-1}{b^{\prime}}_{YX}^{n-1}+{P}_{n-1}\left(Y,X\right)}{512}\right\rangle ,\, {r^{\prime}}_{YX}^{n-1}{g^{\prime}}_{YX}^{n-1}{b^{\prime}}_{YX}^{n-1}\in \left\{\text{0,1},2\dots ,255\right\}.$$

The keys utilized in this phase are obtained using 4D-HLS and Algorithm 1 demonstrates how they are obtained.

Algorithm 1
Algorithm 1
Full size image

Generation of keys

5. Encryption stage 4: scrambled stage

The QFT operator \({\widehat{F}}^{{K}_{1}}\) containing key \({K}_{1}\) is applied to first encrypted image \(\left|{\psi }_{1}\right\rangle\) obtained in diffusion phase to generated final encrypted image \(\left|{\psi }_{2}\rangle .\right.\) Equation (20) describes the specific computation technique.

$$\begin{aligned}\left|{\psi }_{2}\right\rangle &=\frac{1}{{\sqrt{2}}^{h+w}}\sum_{Y=0}^{H-1}\sum_{X=0}^{W-1}{\otimes }_{j=0}^{d-1}|{R^{\prime}}_{YX}^{i}\rangle |{G^{\prime}}_{YX}^{i}\rangle |{B^{\prime}}_{YX}^{i}\rangle {\widehat{F}}^{{K}_{1}}|YX\rangle ,\\ &=\frac{1}{{\sqrt{2}}^{h+w}}\sum_{Y=0}^{H-1}\sum_{X=0}^{W-1}{\otimes }_{j=0}^{d-1}|{R^{\prime}}_{YX}^{{\prime}i}\rangle |{G^{\prime}}_{YX}^{{\prime}i}\rangle |{B^{\prime}}_{YX}^{{\prime}i}\rangle |Y^{\prime}X^{\prime}\rangle .\end{aligned}$$
(20)

Here, the encrypted image \(\left|{\psi }_{1}\right\rangle\) is altered using the generalized FT operator \({\widehat{F}}^{{K}_{1}}\). The encryption process is made more secure by this operation. The generated image \(\left|{\psi }_{2}\right\rangle\) is extremely secure and appropriate for safe transmission or storage since it captures the hidden color data.

Decryption procedure

The decryption procedure reverses the encryption process. The phases are as follows:

1. Decryption stage 1: generation of keys

Getting the required system control settings and initial values is the first step. During this stage, decryption keys are created.

2. Decryption stage 2: scrambled stage

This phase involves the use of FT operator’s inverse \(({\widehat{F}}^{-1})\) to the operator \({({\widehat{F}}^{-1})}^{{K}_{1}}\) and inverse operation of the key. Using the final encrypted image \(|{\psi }_{2}\rangle\) this procedure is performed. Equation (\(21)\) produces the image \(\left|{\psi }_{1}\right\rangle\).

$$\begin{aligned}\left|{\psi }_{1}\right\rangle &=\frac{1}{{\sqrt{2}}^{h+w}}\sum_{Y=0}^{H-1}\sum_{X=0}^{W-1}{\otimes }_{j=0}^{d-1}\left|{R^{\prime \prime}}_{YX}^{i}\right\rangle \left|{G^{\prime \prime}}_{YX}^{i}\right\rangle \left|{B^{\prime \prime}}_{YX}^{i}\right\rangle {\left({\widehat{F}}^{-1}\right)}^{{K}_{1}}\left|Y^{\prime}X^{\prime}\right\rangle ,\\ &=\frac{1}{{\sqrt{2}}^{h+w}}\sum_{Y=0}^{H-1}\sum_{X=0}^{W-1}{\otimes }_{j=0}^{d-1}\left|{R}_{YX}^{{\prime}i}\right\rangle \left|{G}_{YX}^{^{\prime}i}\right\rangle \left|{B}_{YX}^{{\prime}i}\right\rangle \left|YX\right\rangle .\end{aligned}$$
(21)

3. Decryption stage 3: diffusion phase

To recover the color data of image \(\left|{\psi }_{1}\right\rangle\) and acquire original image \(\left|\psi \right\rangle\) prior to encryption, the color encryption operator \({P}_{n}\left(Y,X\right)\) produced by the keys is utilized. This may be computed using Eq. \((22)\).

$$\begin{aligned}&\left|{R}_{YX}^{n-1}{G}_{YX}^{n-1}{B}_{YX}^{n-1}\right\rangle =\left|\frac{512\times {{R}^{\prime}}_{YX}^{n-1}{{G}^{\prime}}_{YX}^{n-1}{{B}^{\prime}}_{YX}^{n-1}-{P}_{n-1}\left(Y,X\right)-1}{256}\right\rangle , \\&\quad {R}_{YX}^{n-1}{G}_{YX}^{n-1}{B}_{YX}^{n-1}\in \left\{\text{0,1},2\dots ,255\right\}.\end{aligned}$$
(22)

By simply reversing the color encryption operator method, this phase makes it possible to get the original image \(\left|\psi \right\rangle\) prior to encryption.

The efficacy and efficiency of the suggested satellite image encryption method will be assessed in the next section utilizing a range of performance measures and tests.

Simulation experiment and analysis

This section focuses on thoroughly evaluating the performance of the suggested image cryptosystem. Tests will be conducted to ensure QCIES is secure against various attacks. The satellite images for this study are obtained from Airbus Defense and Space Limited 202455 and benchmark images (Ape and Jet plane) are obtained from GitHub56.

To simulate QCIES, all experimental trials utilized randomly generated cryptographic keys. Since satellite images are the main focus of our proposed system, we extended our testing to include popular benchmark images such as Ape and Jet plane in order to guarantee the stability and versatility of the recommended encryption method. These images are frequently used as benchmarks in image processing and cryptography. The test images used are five images. Many widely used performance evaluation metrics entropy, histogram, correlation, and key sensitivity, among other perspectives, are used in this work based on current research42,46,56. The experimental setup specifications, including both hardware and software environments, are detailed in Table 2.

Table 2 Software and hardware configurations.

Visual effect

A robust image encryption scheme must transform plaintext images into ciphertext outputs exhibiting visual indistinguishability from random noise. In this subsection, two benchmark images (Ape and Jet Plane) and three satellite images (Malaysia, Waterloo and Rainforest) go through encryption and subsequent decryption processes utilizing our QCIES algorithm. QCIES performance on two conventional images and three satellite images are shown in Fig. 7 to show that it works well not just with satellite images but also with other common types of images used in research. All images are of different sizes selected as test objects.

Fig. 7
Fig. 7
Full size image

Evaluation of suggested encryption and decryption analysis. Images in plaintext are displayed in the second row. Images that have been encrypted are shown in fifth row, while Images that have been encrypted their names and sizes are shown in the third row.

Information entropy analysis

In encrypted communications, information entropy31 serves as a crucial standard. For images, entropy is calculated by analyzing the pixel distribution across different gray levels in each color channel. A more uniform distribution of pixels leads to higher entropy, indicating greater randomness and complexity in the image. Specifically, for the RGB channels of a color image, an absolute entropy’s value 8 signifies that pixel values are evenly distributed, making the image more resistant to analytical attacks. The capacity of image to resist such attacks is strengthened by the higher the entropy, the more equally the pixels are distributed. As a result, an encryption technique’s security and resilience can be assessed using entropy’s information. The formula for calculating information entropy is given in Eq. (23).

$$H\left(z\right)=-\sum_{i=0}^{255}P\left({z}_{i}\right){\text{log}}_{2}P\left({z}_{i}\right).$$
(23)

where \(H\left(z\right)\) represents the value of information entropy, \({z}_{i}\) represents the gray value of first pixel, and \(P\left({z}_{i}\right)\) represents the probability of the gray level. The results reveal a significant difference in entropy between the original and encrypted images. The original images’ entropy is far from 8, whereas the encrypted images show entropy’s value approaching 8, indicating that the QCIES effectively resists attacks based on entropy analysis. This reinforces the security of the algorithm.

To more thoroughly assess the randomness of cipher images, a metric known as Local Shannon Entropy (LSE) has been introduced31. This measure has gained widespread adoption for evaluating the randomness in encrypted images. The mathematical definition of LSE is given as follows:

$${L}_{q,p}\left(s\right)=-\sum_{i=1}^{q}\frac{P\left({s}_{i}\right){\text{log}}_{2}P\left({s}_{i}\right)}{q}.$$
(24)

where \({P}_{w}\left({z}_{i}\right)\) is the probability of intensity \(i\) in the local window, \(p\) is the number of pixels in each block. Table 3 shows global and local entropy of original and encrypted images and Table 4 shows comparison of global entropy levels for several encryption techniques.

Table 3 Information Entropy.
Table 4 Comparison of global entropy levels.

Histogram analysis

A key method for evaluating the image cryptosystem’s efficacy to compare an encrypted image with its original version is the use of the human visual system (HVS). The image’s histogram provides a clear representation of how pixel values are spread throughout the image55. Figures 8, 9 and 10 display various original images alongside their encrypted versions, along with corresponding histograms. The encrypted images’ histograms show almost identical consistent distributions, while the original images’ histograms exhibit distinct analytical features, making it difficult to determine the source of the encrypted images. Statistical analysis on the encrypted image yields no meaningful information, indicating that the encryption system is robust against histogram-based attacks.

Fig. 8
Fig. 8
Full size image

Comparison of Malaysia satellite image (1024 × 1024) and its histogram before & after encryption (I) Malaysia satellite image (II) Malaysia satellite encrypted image (III) Malaysia satellite image’s histogram (IV) Malaysia satellite encrypted image’s histogram.

Fig. 9
Fig. 9
Full size image

Comparison of Waterloo image and its histogram before & after encryption (I) Waterloo image (II) Waterloo encrypted image (III) Waterloo image’s histogram (IV) Waterloo encrypted image’s histogram.

Fig. 10
Fig. 10
Full size image

Comparison of Rainforest image (256 × 256) and its histogram before & after encryption (I) Rainforest image (II) Rainforest encrypted image (III) Rainforest image’s histogram (IV) Rainforest encrypted image’s histogram.

Assessment of histogram uniformity using chi-square test

The uniformity of pixel distribution in encrypted images was rigorously evaluated using the chi-square \(({\chi }^{2})\) test58, a statistical measure that quantifies the discrepancy between observed and expected pixel frequencies. The test statistic is computed as shown in Eq. (25).

$${\chi }^{2}=\sum_{{\varvec{i}}=1}^{256}\frac{{({\rm O}_{i}-{E}_{i})}^{2}}{{E}_{i}}.$$
(25)

where \({\rm O}_{i}\)​ represents the observed frequency of pixel intensity in the encrypted image, and \({E}_{i}\) denotes the expected frequency under a perfectly uniform distribution. For RGB images, the final \({\chi }^{2}\) value was obtained by averaging the results across the R, G, and B channels to ensure comprehensive assessment.

As presented in Table 5, the proposed encryption algorithm consistently accepted the null hypothesis (p > 0.05 at a 5% significance level) for all tested cipher images. This indicates that the encrypted histograms exhibit no statistically significant deviation from uniformity, effectively concealing the redundancy present in the original images. The high p-values confirm that the algorithm successfully eliminates discernible patterns in the pixel distribution, thereby enhancing resistance against statistical attacks. These findings demonstrate the robustness of the encryption scheme in maintaining security against frequency-based cryptanalysis.

Table 5 Chi-square test results for evaluating histogram uniformity.

Correlation analysis

Correlation analysis58 is a method used to evaluate the strength and direction of the relationship between two variables. The correlation coefficient, which ranges from − 1 to + 1, indicates how strongly the two variables are related and the nature of their relationship. A correlation coefficient closer to 0 suggests a weaker relationship, while + 1 represents a perfect positive correlation and − 1 signifies a perfect negative correlation. For an effective encryption algorithm, the correlation in the ciphertext between adjacent pixels should be near to zero. The adjacent pixels’ correlation values in the original and encrypted images are assessed in the diagonal, vertical, and horizontal directions. Therefore, pixel correlation serves as a useful criterion for evaluating the image encryption’s efficacy. The calculation method for the adjacent pixels’ correlation is given by Eq. (26).

$${\rho }_{NM}=\frac{cov\left(N,M\right)}{\sqrt{\sigma \left(N\right)}\sqrt{\sigma \left(M\right)}}.$$
(26)

where \(cov\left(N,M\right)=\frac{1}{X}\sum_{i=1}^{X}\left({N}_{i}-\mu (N)\right)\left({M}_{i}-\mu (M)\right),\) \(\sigma \left(N\right)=\frac{1}{X}\sum_{i=1}^{X}{\left({N}_{i}-\mu (N)\right)}^{2},\) \(\sigma \left(M\right)=\frac{1}{X}\sum_{i=1}^{X}{\left({M}_{i}-\mu (M)\right)}^{2}\) and , \(\mu \left(N\right)=\frac{1}{X}\sum_{i=1}^{X}\left({N}_{i}\right) . X\) is the total pixel pairs, and \({N}_{i}, {M}_{i}\) denote the pixel values of two adjacent pixels. To assess the correlation, ten thousand pairs of neighboring pixels are chosen at random from the image and evaluated in horizontal, vertical, and diagonal directions. Figures 11 illustrate the pixel correlation in the row, column, and diagonal directions for both the original and encrypted Malaysia satellite images. Figure 12 displays the combined 3D RGB channel correlations for all investigated images, with all color channels visualized in a unified plot to demonstrate their inter-channel relationships. Table 6 presents the values of correlation between neighboring pixels in original and encrypted Malaysia satellite images for each color channel (R, G, and B). Table 7 presents the values of correlation between neighboring pixels in original and encrypted Rainforest satellite, Waterloo satellite and Jet Plane images. The average values of the R, G, and B channels of the Malaysia satellite image are used to compute the correlation values.

Fig. 11
Fig. 11
Full size image

Pixel’s correlation in row, column and diagonal direction for both original in first row and encrypted in second row for Malaysia satellite image.

Fig. 12
Fig. 12
Full size image

Combined 3D visualization of RGB channel correlations across all spatial directions for all investigated images.

Table 6 Correlation coefficient values for original and encrypted Malaysia satellite image.
Table 7 Correlation coefficient values for original and encrypted Investigated images.

From the data in Tables 6 and 7, it is evident that the plaintext image has a high pixel correlation (close to 1), indicating a strong relationship between adjacent pixels. The ciphertext image’s pixel distribution becomes more consistent and the correlation is greatly reduced once QCIES is applied. This indicates that the QCIES effectively disrupts the pixel correlation. Combining chaos-controlled parameters with the quantum image Fibonacci transform, after implementing an XOR operation on adjacent pixels, effectively reduces the correlation between adjacent pixels in the encrypted image.

Tables 6 and 7 further demonstrates that images are susceptible to a number of attacks before encryption. However, pixel correlation in ciphertext is markedly weakened, increasing resistance to pixel-level correlation attacks after encryption. This improvement in robustness is a critical feature of QCIES security. The use of chaos-based parameters in combination with the quantum image Fibonacci transform makes QCIES more complex, adding a layer of resistance to attacks that depend on predictable patterns. Table 8 presents the comparison of correlation coefficient values of Ape’s image.

Table 8 Comparability of correlation coefficients values of Ape’s image.

Beyond pixel correlation, the strategy is made to resist a variety of attacks, including brute-force efforts and differential cryptanalysis. It has shown resilience against common attacks, such as differential and frequency analysis. Additionally, the QCIES robustness extends to its ability to maintain security even against potential quantum computing-based attacks.

Differential attack analysis

The effectiveness of image encryption techniques is often assessed through differential attacks1. Differential attack analysis is a cryptanalytic technique that looks at how specific changes made to the input plaintext inside the encryption methods affect the ciphertext that is produced in the end.

Plaintext sensitivity analysis

For an image encryption algorithm to be resilient against such threats, it must exhibit very strong plaintext sensitivity29. This means that even a slight modification such as a single bit change in any pixel of the input image should produce significant and unpredictable differences in the resulting ciphertext. To evaluate the plaintext sensitivity of QCIES, we intentionally altered two pixel bits in a \(512\times 512\) test image: one located at the top-left corner and the other at the bottom-right. The modified images, shown in the second and third columns of the first row in Fig. 13, are visually indistinguishable from the original image. We then encrypted all three images using the QCIES method and computed the differences between the resulting ciphertexts. As illustrated in Fig. 13, the encrypted outputs and their respective difference images appear completely noise-like. This visual evidence confirms that even minimal changes in the plaintext lead to extensive, seemingly random transformations in the ciphertext, demonstrating that QCIES achieves a high level of plaintext sensitivity.

Fig. 13
Fig. 13
Full size image

Visual demonstration of plaintext sensitivity in QCIES : \(\left({{\varvec{a}}}_{1}\right)\) Original test image; \(\left({{\varvec{b}}}_{1}\right)\) Modified image with the least significant bit of the first blue channel pixel inverted; \(\left({{\varvec{c}}}_{1}\right)\) Modified image with the least significant bit of the last red channel pixel inverted; \(\left({{\varvec{d}}}_{1}\right)\) Pixel-wise difference between \(\left({a}_{1}\right)\) and \(\left({b}_{1}\right)\); \(\left({{\varvec{e}}}_{1}\right)\) Pixel-wise difference between \(\left({a}_{1}\right)\) and \(\left({c}_{1}\right)\); \(\left({{\varvec{a}}}_{2}\right)\) Encrypted output corresponding to \(\left({a}_{1}\right)\); \(\left({{\varvec{b}}}_{2}\right)\) Encrypted output corresponding to \(\left({b}_{1}\right)\); \(\left({{\varvec{c}}}_{2}\right)\) Encrypted output corresponding to \(\left({c}_{1}\right)\); \(\left({{\varvec{d}}}_{2}\right)\) Difference between ciphertexts \(\left({a}_{2}\right)\) and \(\left({b}_{2}\right)\); \(\left({{\varvec{e}}}_{2}\right)\) Difference between ciphertexts \(\left({a}_{2}\right)\) and \(\left({c}_{2}\right)\).

This sensitivity is typically linked to the susceptibility of its control parameters and the initial state of the chaotic mapping, both of which affect the plaintext sensitivity in chaotic cryptography. The literature suggests two tests to meet these requirements: Unified Average Changing Intensity (UACI) to determine the mean difference and Number of Pixel Change Rate (NPCR) for contrasting independent pixels. Higher UACI encryption is seen to be more advantageous. A good image encryption technique requires a large valued NPCR.

When the plaintext image’s pixel is altered, corresponding encrypted image should preferably reflect an ordinary change to resist differential attacks. The standard values for NPCR and UACI are 99.6094% and 33.4635%, respectively, and these can be calculated using Eq. (27).

$$\begin{aligned}&NPCR:N\left({\mu }_{1}, {\mu }_{2}\right)=\frac{\sum_{i,j}C\left(i,j\right)}{W\times H}\times 100\%,\\ & UACI:U\left({\mu }_{1}, {\mu }_{2}\right)=\frac{1}{W\times H}{\sum }_{i,j}\frac{\left|{\mu }_{1}\left(i,j\right)-{\mu }_{2}(i,j)\right|}{255}\times 100\%.\end{aligned}$$
(27)

where \(W\) and \(H\) are the width and height of the images, and \(C\left(i,j\right)\) is defined in Eq. (28).

$$C\left(i,j\right)=\left\{\begin{array}{l}0,\quad {\mu }_{1}\left(i,j\right)={\mu }_{2}\left(i,j\right), \\ 1,\quad {\mu }_{1}\left(i,j\right)\ne {\mu }_{2}\left(i,j\right),\end{array}\right.$$
(28)

Here, \({\mu }_{1}\left(i,j\right),{\mu }_{2}(i,j)\) represent the pixel values at point \((i,j)\) in the two ciphertexts. By changing a single bit in the key \(K\), for a same plaintext image two distinct ciphertext images can be generated.

Table 9 shows the NPCR and UACI values of proposed scheme. Experimental results indicate that the NPCR and UACI values of the proposed scheme are close to the ideal values. Table 10 shows a comparison between the NPCR and UACI results obtained from QCIES and those from related studies. When determining the NPCR and UACI values for the images, the average of the R, G, and B channels is taken into account.

Table 9 RGB average NPCR \(\&\) UACI data
Table 10 Comparison of NPCR & UACI values of different algorithms.

Key space and sensitivity research

Key susceptibility is the property of an absolute multimedia encryption system, which signifies that change in a single bit of key should result in drastically divergent encryption output. QCIES utilized in this study is based on a quantum 4D-HLS, which is highly susceptible to the starting values. We conducted sensitivity analysis on related keys. The results, depicted in Fig. 14, highlight the technique’s high sensitivity. Even a slight deviation in the key prevents successful decryption of the original image, further emphasizing the system’s robustness. Figure 14a shows the original image. At first, original image is encrypted using the correct keys as shown in Fig. 14b. Then encrypted image is decrypted using three different sets of keys. We derived three different set of keys \({K}_{1}, {K}_{2}, {K}_{3}\) by applying slight modifications of \(\varepsilon ={10}^{-15}\) to individual components of the original key \(K\) as \({x}_{0}^{\prime}={x}_{0}+\varepsilon , {y}_{0}^{\prime}={y}_{0}+\varepsilon\text{ and }{z}_{0}^{\prime}={z}_{0}+\varepsilon\) and the results are obtained as in Fig. 14c–e. Figure 14f shows the image decrypted with correct set of keys.

Fig. 14
Fig. 14
Full size image

Key susceptibility analysis.

Correct set of Keys \(K=\left({x}_{0}, {y}_{0}, {z}_{0}, {w}_{0}, \alpha , \beta , \gamma , r\right)\)

Incorrect Key \({K}_{1}= \left({x}_{0}^{\prime}, {y}_{0}, {z}_{0}, {w}_{0}, \alpha , \beta , \gamma , r\right)\)

Incorrect Key \({K}_{2}= \left({x}_{0}, {y}_{0}^{\prime}, {z}_{0}, {w}_{0}, \alpha , \beta , \gamma , r\right)\)

Incorrect Key \({K}_{3}= \left({x}_{0}, {y}_{0}, {z}_{0}^{\prime}, {w}_{0}, \alpha , \beta , \gamma , r\right)\)

Table 11 presents the quantitative key sensitivity analysis using NPCR and UACI metrics, demonstrating that slight variations in the encryption key lead to significant changes in the encrypted image.

Table 11 Quantitative key sensitive tests.

A robust encryption approach must have an adequately large key space to make it infeasible for an attacker to discover the correct key within a reasonable timeframe. To withstand advanced attacks, the key space should ideally exceed \({2}^{128}\). In this study, the chaotic system parameters’ precision can be achieved to a level of \({10}^{-16}\). In QCIES, the key space reaches \({10}^{140}\), which is far greater than \({2}^{128}\). This demonstrates that QCIES has a key space large enough to effectively resist brute-force attacks. Table 12 demonstrates the comparison of QCIES key space with other studies.

Table 12 Comparison of key space.

Robustness against transmission noise

During digital transmission, encrypted images frequently encounter channel-induced distortions including additive noise, signal degradation, and data corruption. Such disturbances may compromise decryption fidelity, necessitating robust cryptographic designs capable of withstanding real-world noise interference. Standard evaluation protocols simulate these conditions by applying controlled noise perturbations58 (e.g., Gaussian, salt-and-pepper, occlusion attack) to ciphertext images prior to decryption, with structural similarity metrics quantifying recovery quality.

To evaluate robustness, salt-and-pepper noise (0.05–0.15 density) and Gaussian noise (0.10–0.20 variance) were introduced to encrypted versions of the satellite images, respectively. Figure 15 and 16, shows successful decryption despite these perturbations, proving the algorithm’s noise resistance.

Fig. 15
Fig. 15
Full size image

The transformation effect of “Malaysia satellite” image subjected to various salt and pepper s&p variations.

Fig. 16
Fig. 16
Full size image

The transformation effect of “Retina” image subjected to various Gaussian variations.

Occlusion attack resistance analysis

Robust encryption schemes must maintain data integrity when facing partial data loss, whether from network disruptions or malicious interference. We evaluate our algorithm’s resilience by simulating progressive occlusion attacks (25%, 50%, and 75% data loss) on cipher images. As demonstrated in Fig. 17, the decrypted images retain sufficient visual coherence and recover critical information even under severe occlusion (75% data loss).

Fig. 17
Fig. 17
Full size image

Top row: Encrypted ‘Ape’ image with clipping. Bottom row: Corresponding decrypted image.

Assessment of encryption effectiveness using PSNR and SSIM

To initiate the statistical analysis, the Peak Signal-to-Noise Ratio (PSNR)59 is computed to assess the quality of the encrypted image and ensure that the original image is effectively transformed by the encryption algorithm. PSNR measures the difference between the original and encrypted images, where a lower PSNR value indicates a significant distinction between the plaintext and encrypted images. The formula for calculating PSNR is shown in Eq. (29).

$$\text{log}\frac{255\times 255}{\sqrt{\sum_{i=1}^{n}\sum_{j=1}^{m}\frac{{\left[P\left(i,j\right)-E(i,j)\right]}^{2}}{m\times n\times 3}}}$$
(29)

where \(P\left(i,j\right)\) represents plain image’s while \(E\left(i,j\right)\) represents the encrypted image’s pixel values.

Beyond pixel-by-pixel variations captured by traditional metrics such as PSNR, the Structural Similarity Index Measure (SSIM) is employed to evaluate the similarity between two images in terms of structure, texture, and pixel intensity. Higher SSIM values, which range from 0 to 1, indicate less distortion, whereas an ideal encryption result should yield an SSIM value near zero, signifying that the encrypted image is structurally very different from the original. The formula for calculating SSIM is shown in Eq. (30).

$$=\frac{\left(2{\mu }_{x}{\mu }_{y}+{C}_{1}\right)\left(2{\sigma }_{xy}+{C}_{2}\right)}{\left({{\mu }_{x}}^{2}+{{\mu }_{y}}^{2}+{C}_{1}\right)\left({{\sigma }_{x}}^{2}+{{\sigma }_{y}}^{2}+{C}_{2}\right)}$$
(30)

where \(x\) and \(y\) are corresponding image patches. \({\mu }_{x} \& {\mu }_{y}\) mean intensities, \({{\sigma }_{x}}^{2} \& {{\sigma }_{y}}^{2}\) variance, \({\sigma }_{xy}\) means covariance of \(x\) and \(y\). \({C}_{1} \& {C}_{2}\) are small constants to stabilize the division.

Table 13 demonstrates the PSNR and SSIM values for three encrypted images. It should be noted that the PSNR and SSIM values for the Ape image are calculated by averaging the results across the R, G, and B color channels.

Table 13 PSNR & SSIM values for images.

Efficiency analysis

While security remains paramount, computational efficiency is equally critical for practical deployment of image encryption. Computational complexity analysis focuses on time and spatial complexity. QCIES achieves significant performance gains through three key optimizations. The 4D-HLS generates all keystreams in advance, eliminates iterative chaotic computations during pixel processing. The Quantum Fibonacci Transform (QFT) operates on 8 × 8 pixel blocks (64-bit vectors) instead of individual pixels. All operations (chaotic shuffling, QFT) use relative coordinates, avoiding padding overhead for non-square images.

Time complexity analysis

To thoroughly validate the efficiency advantages of our proposed QCIES algorithm, we conduct timing test under strictly controlled conditions. Table 14 presents computational time measurements for images of varying sizes \((256\times 256, 512\times 384,\, \text{and }\, 1024\times 1024)\). Table 15 compares the computation time from relevant literature in this article by taking average of all image’s values.

Table 14 Evaluation of execution time (in s).
Table 15 Comparison of execution time (in seconds) for \((1024\times 1024)\) size.

Spatial complexity analysis

The quantum XOR operation and quantum Fibonacci transformation have an impact on the intricacy of QCIES. A color image of dimensions \({2}^{n}\times {2}^{n}\) requires \(2n+24\) qubits and contains \(3\times {2}^{2n}\) pixels to be converted into image in quantum state. \(2n\) quantum exchange gates, which can all be broken down into 3 \(CNOT\) gates and an adder module operation are involved in the quantum Fibonacci transformation. The \(ADDER-MOD {2}^{n}\) operation contains \(28n-12\) simple gates53, with total \({x}_{1}^{*}mod\, n\) iterations. Consequently, the total number of basic gates required is \((\left(28n-12\right)+2n\times 3)\times ({x}_{1}^{*}mod\, n)\). The number of shifts is \({x}_{3}^{*}mod\, n+1\) and 23 switching gates are essential for the operation of cycle shift. Therefore, \(23\times 3\times ({x}_{3}^{*}mod\, n+1)\) basic gates involved in the quantum bit level shift function. In terms of quantum resemblance, the XOR function on quantum images needs \(2n-CNOT\) gates. Each \(n-CNOT\) gate can be broken down into \((4n-8)\) Toffoli gates, with each Toffoli gate consisting of 6 CNOT gates17. This results in a total of \((4n-8)\times 2\times 3\times 6\) basic gates (Table 16).

Table 16 Performance analysis phase.

To summarize, the quantum Fibonacci transformation has a complexity of \(O({n}^{2})\), while XOR operation have a complexity of \(O(n)\). Therefore, the GQIR based QCIES has an overall complexity of \(O({n}^{2})\). The traditionsl image encryption teachnique, on the other hand, has an overall complexity of \(O({2}^{2n})\). Therefore, QCIES has a lessened computational complexity compared to the classical encryption algorithm.

Conclusion

This study introduces a novel encryption method designed to enhance the security of sensitive digital evidence, such as satellite images, and represents a significant advancement in the field of digital forensics. Protecting information from unauthorized access is a critical challenge in the practical use of satellite images. With the continuous evolution of cyber threats from malicious actors, researchers are under constant pressure to develop new algorithms that can better secure essential satellite data. By utilizing chaotic systems to maintain transmission confidentiality, this paper seeks to contribute to the field of encrypted satellite images. QCIES provides a valuable tool for forensic applications, ensuring both the confidentiality and integrity of sensitive data.

QCIES begins by utilizing a quantum Fibonacci transform with a key to determine the coordinates of the jumbled values of the pixels during the encryption step. It then uses a quantum chaotic sequence to apply a linear transformation to the pixel data. All pixels are processed to create the ciphertext images after the displacement procedure is complete. When this displacement is paired with pixel gray value encryption utilizing a key, QCIES intricacy and unpredictability are greatly increased. Information entropy, histogram analysis, correlation, and key susceptibility were among the metrics used to evaluate QCIES performance. The outcomes of the experiment were deemed to be quite satisfactory. To enhance the decrypted image’s quality even more, all image encryption operations are performed using reversible quantum logic gates45. QCIES enables the exact restoration of the original image, provided the key is correct.

QCIES is prone to disastrous attacks and produces shuffled images with stronger enhanced security. QCIES overcomes the issues of common encryption techniques, such as recurrence, key space limitations, and exposure to statistical evaluation, and offers dependable and efficient encryption system. QCIES utilizes the properties of Quantum Fibonacci transformation permutation, periodicity, and unpredictability of the 4D-HLS, using the larger key. The Lorenz system provides space in 4 dimensions.

However, it should be noted that quantum image compression faces challenges because real quantum computers aren’t powerful enough to handle large, real-world images. One possible solution is to use classical methods for early steps like feature extraction, and then apply quantum techniques for actual compression. This hybrid approach could be more practical with today’s technology. However, building quantum computers that can scale and work reliably is still a big challenge. Using many quantum gates increases errors due to noise and instability. So, it’s still difficult to apply these algorithms on real quantum hardware. To enhance the image representation and lower computational demands, we plan to investigate an equitably optimized quantum circuit in our future work. This will result in a more effective and adaptable image encryption method.